Transcription

2 SvSnet Stichting Nationale Beheersorganisatie Internet Providers SvSnet founded in 2005 for supporting the NBIP NBIP is the Dutch service organisation for Internet Providers Is it possible to do lawful interception with a group of providers? Does this make it cheaper? Is it safe to let a third party do lawful interception? 2

7 Telecommunications Law (3) Changes in the Telecommunications law for Data retention Law since july 6 th Active since sept. 1 st 2009 art : Retained data may not be used for other purposes 13.2: Data Retention directions for warrants based upon criminal law 13.5: Change of BBGAT to BBGT 13.9: evaluation every 5 jaar Evaluation will be in september 2010! 13.10: Mentioning the attachment wich data to retain 7

19 foundation NBIP National Service Organisatie for Internet Providers 19

20 Goals of the foundation NBIP offering services to providers to fulfil obligations from the telecommunications law, article 13; acting as an intermediar between government and providers, whereas providers can delegate obligations; decrease costs for providers on executing the obligations on technical, economical and organisation level 20

25 NBIP: Procedures: I want to join! procedure take in form with signature status to form applied intake network scan status to aspirant member test taps end-to-end test dependant of ISP services technical report status to member 25

1. Introduction The Eagle Eye - IP tap is a passive IP network application platform for lawful interception and network monitoring. Designed to be used in distributed surveillance environments, the Eagle

Simple Law Enforcement Monitoring Fred Baker draft-baker-slem-architecture-01.txt ftp://ftpeng.cisco.com/fred/ietf/slem.ppt ftp://ftpeng.cisco.com/fred/ietf/slem.pdf The message I wish had been found in

DATRET/EXPGRP (2009) 3 - FINAL EXPERTS GROUP "THE PLATFORM FOR ELECTRONIC DATA RETENTION FOR THE INVESTIGATION, DETECTION AND PROSECUTION OF SERIOUS CRIME" ESTABLISHED BY COMMISSION DECISION 2008/324/EC

Realtime Network Monitoring for Lawful Interception and Data Retention 2 Realtime Network Monitoring with Passive Probes Realtime monitoring of network connections has been used by telecom operators for

Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences

Compliance and Unified Communication January 2015 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how

TAXONOMY OF TELECOM TERMS Prepared by TUFF Ltd This short taxonomy is designed to describe the various terms used in today s telecommunications industry. It is not intended to be all embracing but to describe

ABC SBC: Software Defined Communication Networks FRAFOS GmbH Introduction SIP was designed with the vision of revolutionizing the way communication services are developed, deployed and operated. Following

Integrating Lawful Intercept into the Next Generation 4G LTE Network All telecommunication providers that currently or plan to provide 4G LTE service to their customers must consider significant changes

Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router

Local Area Networks: Internetworking Chapter 81 Learning Objectives List the reasons for interconnecting multiple local area networks and interconnecting local area networks to wide area networks. Identify

The Big Data Mining Company BETTER VISILITY FOR BETTER CONTROL AND BETTER MANAGEMENT 100 Examples on customer use cases Thanks to SECNOLOGY s wide range and easy to use technology, it doesn t take long

WHITE PAPER www.brocade.com Service provider Brocade Telemetry Solutions telemetry applications such as Monitoring and Lawful Intercept are important to Service Providers and impose unique requirements

IT Monitoring Code of Practice 1.4 University of Ulster Code of Practice Cover Sheet Document Title IT Monitoring Code of Practice 1.4 Custodian Approving Committee Deputy Director of Finance and Information

WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another

Annex I Tender specifications Framework contract for Redundant Internet access Open call for tender EEA/OSE/09/006 1. Purpose The purpose of this call is to award a framework contract for a period of six

Datenblatt AND Recorder 5.4 Using affordable call recording enables you to comply with legal and regulatory obligations. These requirements are easily achieved by deploying a secure call recording solution

Wholesale IP Bitstream on a Cable HFC infrastructure In order to understand the issues related to an ISP reselling Cable Based Internet access it is necessary to look at similarities and dissimilarities

Everything Voice SIP Trunks The cost-effective and flexible alternative to ISDN A cost-effective alternative to ISDN that provides flexibility and continuity SIP trunking is the fastest-growing telephony

With SIP Proxy Server It s all about Reducing Cost!!! WHY ADVANCED LCR (Least Cost Routing) Advanced LCR is a product by Advanced Communications; the same parent company of AdvancedVoIP.com, a widely used

REGULATION ON THE PROCEDURES AND PRINCIPLES FOR GRANTING OPERATING CERTIFICATE TO ACCESS PROVIDERS AND HOSTING PROVIDERS BY THE TELECOMMUNICATION AUTHORITY CHAPTER ONE Purpose and Scope, Basis and Definitions

The treatment of Voice over Internet Protocol (VoIP) under the EU Regulatory Framework Response from the UK s Internet Telephony Service Providers Association (ITSPA) About ITSPA This response is on behalf

Integrated management information in utilities Information from Cigré The objective of this article is to assist utilities define, specify and evaluate the high level management systems that form the information

SIP TRUNKING THE COST EFFECTIVE AND FLEXIBLE ALTERNATIVE TO ISDN A cost-effective alternative to ISDN that provides flexibility and continuity Reliable voice services SIP trunking is the fastest-growing

Privacy in the cloud computing, and the company concerned is required to submit a risk analysis to DNB. 3 Cloud computing entails the saving, processing and using of company data on the servers of a cloud

Security Audit VIS Central System Summary Report 1 June 2012 1 1. INTRODUCTION 1.1 Visa information system The Visa Information System (VIS) is a system for the exchange of data on short-stay visas among

Programmable Management Framework for Evolved SDN Sławomir Kukliński! Orange Polska and Warsaw University of Technology! Warsaw, Poland!!!! Kraków, May 9, 2014 Problem statement!! What (is) should be the

SIP trunking, simply put, is a way for you to accomplish something that you already do, for less money, with equal or better quality, and with greater functionality. A Guide to SIP V4 An Introduction to

Voice over IP, or "VoIP" for Voice over IP is a technology that allows to communicate by voice over IP compatible networks, either networks or the Internet. Several solutions exist to make VoIP: Some use

EUROPEAN COMMISSION Brussels, 18.4.2011 COM(2011) 225 final REPORT FROM THE COMMISSION TO THE COUNCIL AND THE EUROPEAN PARLIAMENT Evaluation report on the Data Retention Directive (Directive 2006/24/EC)

Statistics on Requests for data under the Data Retention Directive Introduction 1. Directive 2006/24/EC on data retention ('the DRD') 1 requires Member States to provide the Commission on a yearly basis